SlideShare une entreprise Scribd logo
1  sur  6
The legal framework
Florence DUPRE
Global Forum November 2012
AGENDA




•    Introduction

•    Limits of the legal framework

•    What’s new?

•    The way forward? Perspectives?




Title / Name
© 2012 CASSIDIAN CYBERSECURITY   - All rights reserved   Date   Page   2
LIMITS OF THE CURRENT LEGAL FRAMEWORK


                                                            Geographic issue
                              Concept of                                                     Lack of
                             sovereignty &                                               interoperability
                              territoriality


                                                                                                            Security/privacy:
         Fast evolving
                                                                                                            different interests
          technology
                                                                                                            different approach


                                                             Data protection
                                                              Data breach
      Lack of                                              Data & identity theft
                                                              Cyber crime                                        Applicable law
   harmonization
                                                             Cybersecurity                                       & Jurisdiction?
=> compliance issue
                                                                                                                    Liability ?




                                                                                                    Investigation
               Legal answser is
                                                                                                     & Evidence/
                   difficult
                                                                                                     prosecution
                                                                           Data protection
                                                 The Budapest                & privacy
                                                  convention             laws & Regulations
                                                on Cybercrime?           Data retention laws
Title / Name                                                                & Regulations
© 2012 CASSIDIAN CYBERSECURITY   - All rights reserved   Date                 Page   3
WHAT’S NEW?
                                                                                                                         •   Combination of technical & legal solutions
•     Privacy by Design
     design data processing devices so as to best comply with data protection requirements

                                                                  •        Privacy Enhancing Technologies
                                                                refers to “coherent systems of information and
                                                                       communication technologies that
                                                              strengthen the protection of privacy in information
                                                        systems by preventing the unnecessary or unlawful collection,
                                                              use and disclosure of personal data, or by offering
                                                          tools to enhance an individual’s control over his/her data”.
                                                                                                                                                  •       Identity federation

•     Electronic identity ==>e-ID

                                                                            •       Data & Identity theft
                                                                                          Crime in which someone
                                                                                     illegaly/fraudulently obtains
                                                                                           and uses another
                                                                                         person’s personal data



                                                                                                                                                      •    Digital signature
•     Forensics & Digital evidence
                                                                                                                              •     Social media (Facebook, Twitter…)
                                                                      •         Legal Ethics & Best practices
                                                                                                                                              •           Trust & confidence
•     BYOD ==> security & privacy concerns
                                                                                                                                     •    Mobility & Cloud computing
                                                              •           Cybersecurity/Cybercrime/Cyberwar




Title / Name
© 2012 CASSIDIAN CYBERSECURITY        - All rights reserved       Date                                       Page    4
THE WAY FORWARD? / PERSPECTIVES?


•   Need to adapt the existing legal framework to the technology and the threats
•   Update of the existing cybercrime convention: most of the players agree that what is
    required is to further detail the existing legislation by complementing it with additional rules
    imposing specific technical safeguards against new risks
•   Need for an harmonized and interoperable legal framework at EU & International level
      – Use the results of Working groups/initiatives
      ==> International Telecommunication Union (2007)
      ==> Other United Nations initiatives
•   Extend some existing obligations to other actors ==> security breach notification
•   Development of best practices
•   A specific International criminal court for cyberspace should be established
•   International treaty == > Cyber attacks of the most serious global concern should be
    included in a substantive international criminal law

                            International legal cooperation & harmonization is key
                                   for an efficient & global legal answer



Title / Name
© 2012 CASSIDIAN CYBERSECURITY   - All rights reserved   Date   Page   5
Thank you for your attention!




The reproduction, distribution and utilization of this document as well as
the communication of its contents to others without express authorization
is prohibited. Offenders will be held liable for the payment of damages.
All rights reserved in the event of the grant of a patent, utility model or design.


Title / Name
© 2012 CASSIDIAN CYBERSECURITY   - All rights reserved   Date              Page   6

Contenu connexe

Tendances

Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingDr. Michael Agbaje
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discoveryExterro
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationNicole Black
 
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Rodney D. Ryder
 
Information Explosion - Erik Moller
Information Explosion - Erik MollerInformation Explosion - Erik Moller
Information Explosion - Erik MollerHPDutchWorld
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Jason Haislmaier
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacysalehnia
 
Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)AMIPCI
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Conference Cyber law Bali
Conference Cyber law BaliConference Cyber law Bali
Conference Cyber law BaliMartenLinkedin
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Gridbradley_g
 
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?TEYS Lawyers
 
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009brentcarey
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyIshay Tentser
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015ICT Watch
 

Tendances (20)

Overview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital WatermarkingOverview of Ethical Issues in Digital Watermarking
Overview of Ethical Issues in Digital Watermarking
 
BYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data EverywhereBYOD - Bringing Technology to work | Sending Data Everywhere
BYOD - Bringing Technology to work | Sending Data Everywhere
 
2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery2 7-2013-big data and e-discovery
2 7-2013-big data and e-discovery
 
Cloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association PresentationCloud Computing for Lawyers- Chicago Bar Association Presentation
Cloud Computing for Lawyers- Chicago Bar Association Presentation
 
Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]Introducing the Information Technology Act [Scriboard]
Introducing the Information Technology Act [Scriboard]
 
Information Explosion - Erik Moller
Information Explosion - Erik MollerInformation Explosion - Erik Moller
Information Explosion - Erik Moller
 
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
Boulder/Denver Software Club Presentation: "All Things Data - Data Right...
 
Stallings ch18 privacy
Stallings ch18 privacyStallings ch18 privacy
Stallings ch18 privacy
 
Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)Federal Data Protection Act (FDPA)
Federal Data Protection Act (FDPA)
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Ethical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on ComputingEthical Issues and Relevant Laws on Computing
Ethical Issues and Relevant Laws on Computing
 
Conference Cyber law Bali
Conference Cyber law BaliConference Cyber law Bali
Conference Cyber law Bali
 
Review questions
Review questionsReview questions
Review questions
 
Compliance & Value of Digital Signatures
Compliance & Value of Digital SignaturesCompliance & Value of Digital Signatures
Compliance & Value of Digital Signatures
 
Enlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter GridEnlightened Privacy – by Design for a Smarter Grid
Enlightened Privacy – by Design for a Smarter Grid
 
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
ACT OCN - Unit Titles Law - What's New, What's Next, What Now?
 
Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009Privacy presentation for regional directors july 2009
Privacy presentation for regional directors july 2009
 
Privacy by design for startups: legal and technology
Privacy by design for startups: legal and technologyPrivacy by design for startups: legal and technology
Privacy by design for startups: legal and technology
 
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
Urgensi Perlindungan Data Pribadi Menuju ASEAN Community 2015
 
Privacy and E-Commerce
Privacy and E-CommercePrivacy and E-Commerce
Privacy and E-Commerce
 

En vedette

Web annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012longWeb annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012longGlobalForum
 
3. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v53. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v5GlobalForum
 
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4GlobalForum
 
Steven adler ibm big data predictions
Steven adler   ibm big data predictionsSteven adler   ibm big data predictions
Steven adler ibm big data predictionsGlobalForum
 
Latif ladid gen6 overview
Latif ladid gen6 overviewLatif ladid gen6 overview
Latif ladid gen6 overviewGlobalForum
 
Web samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationWeb samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationGlobalForum
 
5. global forum sg grumbach
5. global forum sg grumbach5. global forum sg grumbach
5. global forum sg grumbachGlobalForum
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentationGlobalForum
 
20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_finGlobalForum
 
Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2GlobalForum
 

En vedette (10)

Web annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012longWeb annika branstrom global forum nov2012long
Web annika branstrom global forum nov2012long
 
3. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v53. w.cellary privacy stockholm_v5
3. w.cellary privacy stockholm_v5
 
Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4Ppt shark global forum session 3 2012 v4
Ppt shark global forum session 3 2012 v4
 
Steven adler ibm big data predictions
Steven adler   ibm big data predictionsSteven adler   ibm big data predictions
Steven adler ibm big data predictions
 
Latif ladid gen6 overview
Latif ladid gen6 overviewLatif ladid gen6 overview
Latif ladid gen6 overview
 
Web samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentationWeb samia mehlem open data and wb main presentation
Web samia mehlem open data and wb main presentation
 
5. global forum sg grumbach
5. global forum sg grumbach5. global forum sg grumbach
5. global forum sg grumbach
 
2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation2 ppt final dan shoemaker dd1 stockholm presentation
2 ppt final dan shoemaker dd1 stockholm presentation
 
20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin20121112 global forum_ntt_niwano_fin
20121112 global forum_ntt_niwano_fin
 
Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2Global forum 2012 pascal poitevin v2
Global forum 2012 pascal poitevin v2
 

Similaire à 4. florence dupre new usagesprivacy legal framework fd

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimIGF Indonesia
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Symantec APJ
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Alan McSweeney
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013Mydex CIC
 
Ley protección de datos personales
Ley protección de datos personalesLey protección de datos personales
Ley protección de datos personalesJuan Carlos Carrillo
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Actburto111
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)brentcarey
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...David Cunningham
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowermentnellykelly1663
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsAbbie Hosta
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Datarobkitchin
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteitStichting ePortfolio Support
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandHector Dominguez
 

Similaire à 4. florence dupre new usagesprivacy legal framework fd (20)

Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
idigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarimidigf - hukum - ui - edmon makarim
idigf - hukum - ui - edmon makarim
 
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
 
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
Data Privatisation, Data Anonymisation, Data Pseudonymisation and Differentia...
 
UNIT V.pptx
UNIT V.pptxUNIT V.pptx
UNIT V.pptx
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
Introduction to Mydex CIC Personal Data Stores -  7th March 2013Introduction to Mydex CIC Personal Data Stores -  7th March 2013
Introduction to Mydex CIC Personal Data Stores - 7th March 2013
 
Ley protección de datos personales
Ley protección de datos personalesLey protección de datos personales
Ley protección de datos personales
 
The Data Protection Act
The Data Protection ActThe Data Protection Act
The Data Protection Act
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
2011 hildebrandt institute cio forum data privacy and security presentation...
2011 hildebrandt institute cio forum   data privacy and security presentation...2011 hildebrandt institute cio forum   data privacy and security presentation...
2011 hildebrandt institute cio forum data privacy and security presentation...
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Personal Data Protection Law
Personal Data Protection LawPersonal Data Protection Law
Personal Data Protection Law
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
Securing Your Digital Files from Legal Threats
Securing Your Digital Files from Legal ThreatsSecuring Your Digital Files from Legal Threats
Securing Your Digital Files from Legal Threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethics and Politics of Big Data
Ethics and Politics of Big DataEthics and Politics of Big Data
Ethics and Politics of Big Data
 
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit28032012 Irma vander Ploeg: e portfolio als digitale identiteit
28032012 Irma vander Ploeg: e portfolio als digitale identiteit
 
Privacy and data protection primer - City of Portland
Privacy and data protection primer - City of PortlandPrivacy and data protection primer - City of Portland
Privacy and data protection primer - City of Portland
 

Plus de GlobalForum

7. brigitte d'heygere
7. brigitte d'heygere7. brigitte d'heygere
7. brigitte d'heygereGlobalForum
 
Corporate urban f presentation europe
Corporate urban f presentation  europeCorporate urban f presentation  europe
Corporate urban f presentation europeGlobalForum
 
7 ppt thunus global forum
7 ppt thunus global forum7 ppt thunus global forum
7 ppt thunus global forumGlobalForum
 
6 ppt hoddevik short final
6 ppt hoddevik short final6 ppt hoddevik short final
6 ppt hoddevik short finalGlobalForum
 
5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbgGlobalForum
 
4 ppt myeongki baek
4 ppt myeongki baek4 ppt myeongki baek
4 ppt myeongki baekGlobalForum
 
3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm esGlobalForum
 
Wormeli global forum 2012
Wormeli global forum 2012Wormeli global forum 2012
Wormeli global forum 2012GlobalForum
 
12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebookGlobalForum
 
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebookGlobalForum
 
Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3GlobalForum
 
Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012GlobalForum
 
1 ppt h lindskog rev
1 ppt h lindskog rev1 ppt h lindskog rev
1 ppt h lindskog revGlobalForum
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobalForum
 
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobalForum
 
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobal Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobalForum
 
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...GlobalForum
 
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECTGlobal Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECTGlobalForum
 
Global Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOAGlobal Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOAGlobalForum
 

Plus de GlobalForum (20)

7. brigitte d'heygere
7. brigitte d'heygere7. brigitte d'heygere
7. brigitte d'heygere
 
Corporate urban f presentation europe
Corporate urban f presentation  europeCorporate urban f presentation  europe
Corporate urban f presentation europe
 
7 ppt thunus global forum
7 ppt thunus global forum7 ppt thunus global forum
7 ppt thunus global forum
 
6 ppt hoddevik short final
6 ppt hoddevik short final6 ppt hoddevik short final
6 ppt hoddevik short final
 
5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg5 ppt johannes wimmer global forum session_6_bbg
5 ppt johannes wimmer global forum session_6_bbg
 
4 ppt myeongki baek
4 ppt myeongki baek4 ppt myeongki baek
4 ppt myeongki baek
 
3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es3 ppt eleanor stewart global forum stockholm es
3 ppt eleanor stewart global forum stockholm es
 
Wormeli
WormeliWormeli
Wormeli
 
Wormeli global forum 2012
Wormeli global forum 2012Wormeli global forum 2012
Wormeli global forum 2012
 
12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook12 11-11 global forum sto thomas myrup kristensen facebook
12 11-11 global forum sto thomas myrup kristensen facebook
 
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook2. 2012 11-11 global forum sto thomas myrup kristensen facebook
2. 2012 11-11 global forum sto thomas myrup kristensen facebook
 
Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3Ppt samia mehlem global forum samia m session 3
Ppt samia mehlem global forum samia m session 3
 
Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012Annika branstrom short global forum nov.2012
Annika branstrom short global forum nov.2012
 
1 ppt h lindskog rev
1 ppt h lindskog rev1 ppt h lindskog rev
1 ppt h lindskog rev
 
Global Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia MoranGlobal Forum 2012: Francisco Garcia Moran
Global Forum 2012: Francisco Garcia Moran
 
Global forum 2012: Gaetano Santucci
Global forum 2012: Gaetano SantucciGlobal forum 2012: Gaetano Santucci
Global forum 2012: Gaetano Santucci
 
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government AuthorityGlobal Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
Global Forum 2012 Presentation: Nesar Maroof, Bahrain Government Authority
 
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...Global Forum 2012 Presentation:  Amadou Daffe, Code4Africa on Platforms to Gr...
Global Forum 2012 Presentation: Amadou Daffe, Code4Africa on Platforms to Gr...
 
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECTGlobal Forum 2012 Presentation:  Luis Rodriguez-Rosello, DG CONNECT
Global Forum 2012 Presentation: Luis Rodriguez-Rosello, DG CONNECT
 
Global Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOAGlobal Forum 2012: Christine Leurquin, ESOA
Global Forum 2012: Christine Leurquin, ESOA
 

4. florence dupre new usagesprivacy legal framework fd

  • 1. The legal framework Florence DUPRE Global Forum November 2012
  • 2. AGENDA • Introduction • Limits of the legal framework • What’s new? • The way forward? Perspectives? Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 2
  • 3. LIMITS OF THE CURRENT LEGAL FRAMEWORK Geographic issue Concept of Lack of sovereignty & interoperability territoriality Security/privacy: Fast evolving different interests technology different approach Data protection Data breach Lack of Data & identity theft Cyber crime Applicable law harmonization Cybersecurity & Jurisdiction? => compliance issue Liability ? Investigation Legal answser is & Evidence/ difficult prosecution Data protection The Budapest & privacy convention laws & Regulations on Cybercrime? Data retention laws Title / Name & Regulations © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 3
  • 4. WHAT’S NEW? • Combination of technical & legal solutions • Privacy by Design design data processing devices so as to best comply with data protection requirements • Privacy Enhancing Technologies refers to “coherent systems of information and communication technologies that strengthen the protection of privacy in information systems by preventing the unnecessary or unlawful collection, use and disclosure of personal data, or by offering tools to enhance an individual’s control over his/her data”. • Identity federation • Electronic identity ==>e-ID • Data & Identity theft Crime in which someone illegaly/fraudulently obtains and uses another person’s personal data • Digital signature • Forensics & Digital evidence • Social media (Facebook, Twitter…) • Legal Ethics & Best practices • Trust & confidence • BYOD ==> security & privacy concerns • Mobility & Cloud computing • Cybersecurity/Cybercrime/Cyberwar Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 4
  • 5. THE WAY FORWARD? / PERSPECTIVES? • Need to adapt the existing legal framework to the technology and the threats • Update of the existing cybercrime convention: most of the players agree that what is required is to further detail the existing legislation by complementing it with additional rules imposing specific technical safeguards against new risks • Need for an harmonized and interoperable legal framework at EU & International level – Use the results of Working groups/initiatives ==> International Telecommunication Union (2007) ==> Other United Nations initiatives • Extend some existing obligations to other actors ==> security breach notification • Development of best practices • A specific International criminal court for cyberspace should be established • International treaty == > Cyber attacks of the most serious global concern should be included in a substantive international criminal law International legal cooperation & harmonization is key for an efficient & global legal answer Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 5
  • 6. Thank you for your attention! The reproduction, distribution and utilization of this document as well as the communication of its contents to others without express authorization is prohibited. Offenders will be held liable for the payment of damages. All rights reserved in the event of the grant of a patent, utility model or design. Title / Name © 2012 CASSIDIAN CYBERSECURITY - All rights reserved Date Page 6